Communication Theory of Secrecy Systems*
From MaRDI portal
Publication:3645296
Recommendations
Cited in
(only showing first 100 items - show all)- Not all (possibly) “random” sequences are created equal
- Characterization for entropy of shifts of finite type on Cayley trees
- Improvement of quantum dialogue based on entanglement swapping and Hadamard operation via cavity QED
- Quantum cryptography and security analysis
- Stream/block ciphers, difference equations and algebraic attacks
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Involutory-multiple-lightweight MDS matrices based on Cauchy-type matrices
- A framework to optimize implementations of matrices
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- 3D: A Three-Dimensional Block Cipher
- On the fractional-order extended Kalman filter and its application to chaotic cryptography in noisy environment
- Randomized machine learning of nonlinear models with application to forecasting the development of an epidemic process
- Mediated semi-quantum secure direct communication
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A new chaotic algorithm for image encryption
- A chaotic image encryption scheme owning temp-value feedback
- Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes
- Undecidable cases of model checking probabilistic temporal-epistemic logic (extended abstract)
- A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
- SPF-CA: a new cellular automata based block cipher using key-dependent S-boxes
- Estimating Kolmogorov-Sinai entropy from time series of high-dimensional complex systems
- Doubly perfect nonlinear Boolean permutations
- Data-driven computing in dynamics
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
- Robust quantum dialogue based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state
- Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map
- A method of eliminating information disclosure in view publishing
- Continuous-variable quantum key distribution protocols with eight-state discrete modulation
- An information-theoretic model for steganography
- A Novel Digital Image Encryption Algorithm Based on Orbit Variation of Phase Diagram
- Wave-shaped round functions and primitive groups
- Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile
- Breaking a chaotic image encryption algorithm based on perceptron model
- Quantum authencryption with two-photon entangled states for off-line communicants
- Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes
- Markovian and non-Markovian quantum measurements
- Information Theoretic Security for Encryption Based on Conditional Rényi Entropies
- Synchronization of different dimensions fractional-order chaotic systems with uncertain parameters and secure communication
- A first study of improving transposition cryptosystem
- A quantum key distribution routing scheme for hybrid-trusted QKD network system
- Elements of randomized forecasting and its application to daily electrical load prediction in a regional power system
- Quantum stream ciphers: impossibility of unconditionally strong algorithms
- Generative adversarial networks-based pseudo-random number generator for embedded processors
- A less known side of quantum cryptography
- Controlled henon system and its cryptographic applications
- scientific article; zbMATH DE number 1418481 (Why is no real title available?)
- Quantum dialogue protocols immune to collective noise
- A novel heuristic method for obtaining \(S\)-boxes
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- scientific article; zbMATH DE number 4158546 (Why is no real title available?)
- Heuristic search of (semi-)bent functions based on cellular automata
- A construction of novel chaos base nonlinear component of block cipher
- A plaintext-related image encryption algorithm based on compressive sensing and a novel hyperchaotic system
- Quantum secret sharing based on continuous-variable GHZ states
- On the optimality of quantum encryption schemes
- scientific article; zbMATH DE number 1701344 (Why is no real title available?)
- Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes
- Solving the Running Key Cipher with the Viterbi Algorithm
- On some connections between statistics and cryptology
- Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
- Quantum key agreement against collective decoherence
- Data driven computing with noisy material data sets
- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
- A formal analysis of information disclosure in data exchange
- Some generalizations of Shannon's theory of perfect ciphers
- Nonrelatively measurable functions for secure communications signal design
- Identity-based quantum designated verifier signature
- OAEP Is Secure under Key-Dependent Messages
- Randomness measures related to subset occurrence
- Outer-convex dominating set in the corona of graphs as encryption key generator
- Computational Security of Quantum Encryption
- Public-key quantum digital signature scheme with one-time pad private-key
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Type-preserving matrices and security of block ciphers
- Block encryption of quantum messages
- RETRACTED: Fresnelet approach for image encryption in the algebraic frame
- FAST, PARALLEL AND SECURE CRYPTOGRAPHY ALGORITHM USING LORENZ'S ATTRACTOR
- Dirac-based reduction techniques for quantitative analysis of discrete-time Markov models
- Robust reversible data hiding scheme based on two-layer embedding strategy
- Cryptanalysis of Rijndael S-box and improvement
- On functional specification of Latin squares
- Cascade ciphers: The importance of being first
- PAC privacy: automatic privacy measurement and control of data processing
- Connections among nonlinearity, avalanche and correlation immunity
- Optimal potentials for diffusive search strategies
- Digital image scrambling based on a new one-dimensional coupled sine map
- Combinatorial bounds and characterizations of splitting authentication codes
- A conceptual framework for secrecy-preserving reasoning in knowledge bases
- Gambling, computational information and encryption security
- Semi-quantum designated verifier signature scheme
- Some graph-based encryption schemes
- Shannon's random-cipher result and the R-norm information
- Computer cryptographic techniques for processing and storage of confidential information†
- Universal homophonic coding scheme using differential encoding and interleaving
- Shannon's random-cipher result and the generalized \(R\)-norm entropy of type \(\beta\)
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- From enumerating to generating: a linear time algorithm for generating 2D lattice paths with a given number of turns
This page was built for publication: Communication Theory of Secrecy Systems*
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3645296)